scholarly journals Inverting the model of genomics data sharing with the NHGRI Genomic Data Science Analysis, Visualization, and Informatics Lab-space (AnVIL)

2021 ◽  
Author(s):  
Michael C. Schatz ◽  
Anthony A. Philippakis ◽  
Enis Afgan ◽  
Eric Banks ◽  
Vincent J. Carey ◽  
...  

AbstractThe traditional model of genomic data analysis - downloading data from centralized warehouses for analysis with local computing resources - is increasingly unsustainable. Not only are transfers slow and cost prohibitive, but this approach also leads to redundant and siloed compute infrastructure that makes it difficult to ensure security and compliance of protected data. The NHGRI Genomic Data Science Analysis, Visualization, and Informatics Lab-space (AnVIL; https://anvilproject.org) inverts this model, providing a unified cloud computing environment for data storage, management, and analysis. AnVIL eliminates the need for data movement, allows for active threat detection and monitoring, and provides scalable, shared computing resources that can be acquired by researchers as needed. This presents many new opportunities for collaboration and data sharing that will ultimately lead to scientific discoveries at scales not previously possible.

Cell Genomics ◽  
2022 ◽  
Vol 2 (1) ◽  
pp. 100085
Author(s):  
Michael C. Schatz ◽  
Anthony A. Philippakis ◽  
Enis Afgan ◽  
Eric Banks ◽  
Vincent J. Carey ◽  
...  

2018 ◽  
Vol 5 (2) ◽  
pp. 1 ◽  
Author(s):  
SHAFI'I MUHAMMAD ABDULHAMID ◽  
NAFISAT ABUBAKAR SADIQ ◽  
ABDULLAHI MOHAMMED ◽  
NADIM RANA ◽  
HARUNA CHIROMA ◽  
...  

2013 ◽  
Vol 347-350 ◽  
pp. 3312-3316
Author(s):  
Hong Jun Chen ◽  
Xue Qin Wu

The positive factors of the cloud computing: the great commercial value, the cheap and convenient use, has been recognized widely. But there are many risks on security. These security risks will greatly restrict the development of cloud computing. Cloud security risks such as: the cloud platform is easily vulnerable, cloud resources is easily abused, the cloud platform data is accessed by unauthorized user or the data is missing, the violations in the network is difficult to trace and survey, and the service providers replacement will affect the migration of the users data and services. So we research the virtualization technology, data backup and disaster recovery technology, encryption technology of data storage and transmission, the authentication technology of service providers and users, risk assessment, and legal constraints and safety training. Our research is strived to obtain a secure cloud computing environment.


2020 ◽  
Vol 5 (19) ◽  
pp. 26-31
Author(s):  
Md. Farooque ◽  
Kailash Patidar ◽  
Rishi Kushwah ◽  
Gaurav Saxena

In this paper an efficient security mechanism has been adopted for the cloud computing environment. It also provides an extendibility of cloud computing environment with big data and Internet of Things. AES-256 and RC6 with two round key generation have been applied for data and application security. Three-way security mechanism has been adopted and implemented. It is user to user (U to U) for data sharing and inter cloud communication. Then user to cloud (U to C) for data security management for application level hierarchy of cloud. Finally, cloud to user (C to U) for the cloud data protection. The security analysis has been tested with different iterations and rounds and it is found to be satisfactory.


2020 ◽  
Vol 33 (7) ◽  
pp. e4307 ◽  
Author(s):  
Chandrashekhar Meshram ◽  
Cheng-Chi Lee ◽  
Abhay S. Ranadive ◽  
Chun-Ta Li ◽  
Sarita Gajbhiye Meshram ◽  
...  

Author(s):  
Hadeel Mushtaq Shakir ◽  
Dr. Syed Zeeshan Hussain

Our understanding of the importance of cloud computing-based electronic commerce in the digital world involves researching and looking for the most important issues faced by electronic commerce and security threats, and user information protection, and as a result, an e-commerce application framework can be proposed which may be based on the concepts, the origins, and development trend of cloud computing which copes with the problem of e-commerce and the storage of resources. As it is on record that cloud computing is widely known for its robust and strong support for data storage and mining. It also offers a most reliable platform for safe, secure, and speedy data transactions at a very manageable cost and a high level of privacy. Therefore, this paper has examined, analyzed, and discussed the current state of e-commerce and also, we provide much literature that has researched the security problems e-commerce faces in a cloud computing environment and some of them suggested some e-commerce security solutions.


2018 ◽  
Vol 19 (4) ◽  
pp. 351-360
Author(s):  
Prabu S ◽  
Gpinath Ganapathy ◽  
Ranjan Goyal

Cloud computing is an evolving computing technology that provides many services such as software and storage. With the introduction of cloud storage, the security of outsourced data has become a major issue in cloud computing. Data storage in cloud computing environment needs to be secured in order to provide a safe and foolproof security for data outsourcing of the cloud service users. This paper presents a model for security of data in public cloud storage environment which successfully detects the unauthenticated access or any anomaly in the data. The proposed authentication model along with the data security model presented in this paper shows that this model is the best model suitable for securing the data in cloud computing environment


Sign in / Sign up

Export Citation Format

Share Document